CN102103539A - Z-specification-based test case generating method - Google Patents
Z-specification-based test case generating method Download PDFInfo
- Publication number
- CN102103539A CN102103539A CN 201110059216 CN201110059216A CN102103539A CN 102103539 A CN102103539 A CN 102103539A CN 201110059216 CN201110059216 CN 201110059216 CN 201110059216 A CN201110059216 A CN 201110059216A CN 102103539 A CN102103539 A CN 102103539A
- Authority
- CN
- China
- Prior art keywords
- test case
- test
- code
- input
- precondition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Debugging And Monitoring (AREA)
Abstract
The invention relates to data processing and testing. In order to test a measuring object efficiently and accurately, the technical scheme used by the invention is a Z-specification-based test method which comprises the following steps of: 1, describing the specification of a software system by using a Z language to make the description of a formalization method accurate and sufficiently exert an advantage without ambiguity; 2, generating a precondition in a predicate part of a basic module mode of the Z language and ensuring the integrity of a module and the non-verbosity of the precondition simultaneously; 3, generating a usable test case with high coverage ratio by a proper algorithm according to the acquired precondition; and 4, verifying whether the code of a user accords with the predicted code of a program or not by detecting the code, and providing a corresponding test report by comparing the output of a target code with the output of the acquired test case. The method is mainly applied to data processing and testing.
Description
Technical field
The present invention relates to data processing, test, specifically relate to method for generating test case based on the Z specification.
Background technology
Along with popularizing of computing machine and internet, software has become the important carrier that the information age resource obtains and utilizes.Under these circumstances, the safety of software just becomes every important leverage working properly, that efficiently carry out.But, software is not born safety, and the basic method of solution software security problem is exactly to improve the mode that we build software, promptly in the process that makes up software, security is considered as an important factor, made it become an emphasis in each stage of software development.Software test is an important stage of software development.And test case, i.e. the generation of test data is an important content in the software test, the quality of test case is directly connected to the quality of test effect.Therefore, the generation of test case is the core of test job.
For the specification to software is described accurately, thereby for the generation of software test case provides good basis, formalization method arises at the historic moment and is used.
Formalization method has overcome ambiguity, ambiguousness and the imperfection that causes when adopting the natural language description specification.It is based on a special kind of skill that mathematical method is described the destination software systems performance, with strict mathematic sign and mathematics rule effective analysis-by-synthesis and reasoning is carried out in the structure and the behavior of destination software systems.It is the explanation of system, and exploitation and checking provide a framework, is beneficial to find the inconsistency in the destination software systems demand, situations such as imperfection.Develop software with formalization, can improve the correctness and the reliability of software systems, and can improve efficiency of software.
The Z specification is the widest a kind of specification method of the present scope of application.It is based on the form specification language of first-order predicate logic and set theory, because it has adopted strict mathematical theory, can produce concisely, accurately, no ambiguity and evincible specification.Compare with other specification language, main characteristics of Z language is to carry out reasoning and proof to the Z specification.
Do not see at present method for generating test case report based on the Z specification.
Summary of the invention
For overcoming the deficiencies in the prior art, realize efficiently, accurately measuring object tested, the technical solution used in the present invention is that the method for generating test case based on the Z specification comprises the following steps:
1, describes the specification of software systems with the Z language, make the description of formalization method accurate, do not have ambiguous advantage to be not fully exerted;
2. from the predicate part of the basic module pattern of Z language, generate precondition, guarantee the nonredundancy of the integrality and the precondition of module simultaneously;
3. according to the precondition that obtains, adopt suitable algorithm, generate available and test case that coverage rate is high;
4. whether by the detection to code, whether checking user's code meets the expection to program, and identical with the output of the test case that has obtained by the output of comparison object code, provides a corresponding test report.
Available and the test case that coverage rate is high of described generation comprises the following steps: at first, and the equivalence class of test case is divided; Then, according to the difference of classification, from different fields, choose test case; Carry out gathering of test case at last.
Generate available and test case that coverage rate is high is specially:
Known op_ClientEncode, it is the title of a method, be illustrated in the ciphering process of client when carrying out the data interaction activity on the net, test whether operate as normal of the method by the character string of input different length, the original test case of its generation is as shown in table 1.
The original list of table 1 test case
The input data | Output data |
‘’ | 7215ee9c7d9dc229d2921a40e899ec5f |
‘a’ | 0cc175b9c0f1b6a831c399e269772661 |
‘b’ | 92eb5ffee6ae2fec3ad71c777531578f |
‘c’ | 4a8a08f09d37b73795649038408b5f33 |
‘d’ | 8277e0910d750195b448797616e091ad |
‘e’ | e1671797c52e15f763380b45e841ec32 |
... | ... |
‘ab’ | 187ef4436122d1cc2f40dc2b92f0eba0 |
... | ... |
(1) equivalence class of test case is divided:
Principle in line with equivalence class is divided is divided into three with the test case equivalence class in the table 1, is respectively: be input as null character (NUL); Input has only a character and input that a plurality of characters are arranged;
(2) from different fields, choose test case:
From three different test case equivalence classes, select a test case respectively: ' '; ' a '; ' abcdefghigklmn ';
(3) carry out gathering of test case;
The test case of choosing in the abovementioned steps (2) can generate available and test case that coverage rate is high, and its result is as shown in table 2:
Table 2 is through the test case tabulation of abbreviation
The input data | Output data |
‘’ | 7215ee9c7d9dc229d2921a40e899ec5f |
‘a’ | 0cc175b9c0f1b6a831c399e269772661 |
‘abcdefghigklmn’ | 5fdddbca10d5f9ff15178e1b3e86f2cb |
The present invention has following technique effect:
This instrument of Z specification preediting part by utilizing Z/EVES has been finished the writing of Z specification pattern, and can have been resolved the Z specification, and grammer detects, and the territory is detected, and the predicate reasoning, formula identity etc.For the work of ensuing Z specification preprocessing part provides input information, Z specification preprocessing part is mainly finished the abbreviation to the Z specification, and it is the basis that software test case generates.The generation of test case is the core of test job, and the generating portion of test case is used to finish this core work just.It obtains the precondition data of designated mode by the interface that provides, and presses the criterion that equivalence class is divided then, generates the test case that has high coverage rate and simplify.Code verification and report generating portion are input to test case in the personal code work, and by with the position of the name of method and file as parameter, realized this process of actual detected to code.And test report returned to the user.
By the co-ordination of above four parts, the user can carry out the Z specification representation to system, and this Z specification is carried out preliminary analysis, utilizes analysis result to generate test case automatically or semi-automatically, and test case is further simplified.Finally obtain user's true engineering code, and then, finish test, find the leak and the defective that exist in the software code with in the middle of the test case input code.Thereby improve efficiency of software and safety coefficient.
Description of drawings
Fig. 1 test case generates and the code verification module diagram.
Fig. 2 Z/EVES edits exemplary plot.
Fig. 3 Z rule abbreviation synoptic diagram.
Fig. 4 code verification and test report product process figure.
Embodiment
The objective of the invention is to specification based on Z, utilize it to describe accurately, there is not ambiguous advantage, performance to target software is described, by the Z specification is studied, the data type that wherein occurs is analyzed, and utilized analysis result to generate test case, give in verifying and provide test report by the code verification platform at last.Thereby improve efficient, accuracy and the security of software test.Specifically, comprise the following aspects:
1. describe the specification of software systems with the Z language, guarantee its correctness simultaneously.Make the description of formalization method accurate, do not have ambiguous advantage to be not fully exerted;
2. from the predicate part of the basic module pattern of Z language, generate precondition, guarantee the nonredundancy of the integrality and the precondition of module simultaneously.
3. according to the precondition that obtains, adopt suitable algorithm, generate available and test case that coverage rate is high.
4. by the detection to code, whether checking user's code meets our expection to program.And whether identical by the output of comparison object code with the output of the test case that has obtained, provide a corresponding test report.
At above-mentioned purpose, target, the software test case based on the Z specification that the present invention proposes generates and roughly is divided into four parts: the edit segment of Z specification, Z specification preprocessing part, test case generating portion and code verification and report generating portion, as shown in Figure 1.At first to edit, detect, and this Z specification is simplified and other pre-service the Z specification.Then, utilize Z specification and the good rule of some predefines after simplifying, can generate test case, and, these test cases are carried out abbreviation, obtain test case and simplify collection most according to the principle that equivalence class is divided.At last, test case is input in the middle of the object code that the user provides, detects, and finally generate test report, return to the user.
1.Z the editor of specification: the Z specification is the description to the function of software, has simultaneously also provided their restriction to software performance.In research of the present invention, mainly be to use this instrument of Z/EVES, can write Z specification pattern easily with it.It also is an effective tool of analyzing the Z specification, can be used for the Z specification is resolved, and grammer detects, and the territory is detected, and can carry out predicate reasoning, formula identity or the like.The user can directly edit the Z specification in the Z/EVES the inside, and its editing interface as shown in Figure 2.
2.Z the pre-service of specification: this stage mainly is the preliminary scanning of finishing the Z specification, carries out some pre-service work.The working contents of this part comprises the processing to the statement of the distinctive data type of Z in the Z specification, and the processing to the statement of the data type of complexity also has the processing to the statement of method, the Z rule is carried out abbreviation etc., as shown in Figure 3.
3. the generation of test case: test case, i.e. the generation of test data is an important content in the software test.The function of this module is at the pattern precondition that obtains, and utilizes the test case generating algorithm that proposes, and finishes the generation of test case.At first, obtain the precondition data of designated mode by the interface that provides, the equivalence class criterion of dividing generates the test case that has high coverage rate and simplify then.
4. the generation of code verification and report: this part is the part of actual detected code.Groundwork is whether checking user's code meets our expection to program, and provides a test report.Its process has comprised four parts: test case input, code verification platform, result compare and the generation test report.Their function is respectively: utilize the test data of previous step generation, and its importation is extracted separately, as the importation to object code; Call the importation of test case, and the object code that needs test is found in name and the path of passing through the method called; Whether the output of comparison object code is identical with the output of the test case that has obtained, and different items is carried out record; If comparative result is identical, then provide the report passed through of test, otherwise, provide the conclusion of test crash, and the experimental data of test crash is gathered, return to the user.Test report product process figure as shown in Figure 4.
With an example application of the present invention is described below.
One. the target software performance is carried out the Z specification representation
Z specification representation shown in Figure 1 when carrying out data interaction on the net, the required satisfied security constraint of server and client side.
Above data are the data statement part of the Z specification representation of Fig. 1.
Two. the Z specification is carried out pre-service
1. above-mentioned Z specification is analyzed
(1) to the statement of data type.
Just to Resource, EventType, Bool, BlackList_SQL, the statement of User and DB.Wherein, Resource, EventType and Bool are simple enumeration type, and DB and User then are compound types.Our first step work will scan the Z specification exactly, obtains the statement to these data types, and writes into database, perhaps it is carried out corresponding advanced processing, for next step work is got ready.
(2) to the statement of function.
In this Z specification, be exactly statement to function m d5.Shown in the following formula.When the data of these types of scanning, we need the user that the true code of the definition of its corresponding function is provided, and these function names and definition code are write into database together, use for the later stage.Such as herein, should be provided for the code of md5, use during in order to the generation test case.
md5:seq?Char→seq?Char
2. above-mentioned Z specification is carried out abbreviation
This is the method realization part of the Z specification that we detect to needs, also is the emphasis that we work.Wherein, the client encrypt process of op_ClicentEncode explanation, what op_Validate represented is server end safety verification process.What op_Authenticate represented is the server end authentication process itself.Because the back state variable does not all appear in these processes,, will dissolve into the disjunctive normal form form to the Z specification that method is described so can directly use the algorithm that generates disjunctive normal form.
(1) the op_ClientEncode method is carried out the disjunctive normal form abbreviation as can be known, because its predicate partly has only an expression formula, so its disjunctive normal form also has only one, so its final form is exactly:
output!=md5?input?
(2) to the abbreviation of op_Validate, can obtain:
(3) op_Authenticate is carried out abbreviation, can obtain its disjunctive normal form is to be shown below:
Three. the generation of test case
The thinking of choosing with the test point of numeric type data of choosing to the test point of nonnumeric type is the same substantially.At first be that the equivalence class of test case is divided, according to the difference of classification, from different fields, choose test case then, carry out gathering of test case at last.
To choosing of the test case of above-mentioned example, we can obtain following result:
1.op_ClientEncode:
Wherein, to the MD5 algorithm, we need the user that source code to this method is provided.Suppose to have had in the storehouse source code of this method.The constraint of its Z specification is considerably less, still can test whether operate as normal of the method by the character string of input different length.The test case of its generation (suppose that the MD5 algorithm that uses is 32, and the letter that generates being small letter) as shown in table 1.The quantity of original test case is very huge, because program can be carried out the generation of test case to the combination of all letters.
The original list of table 1 test case
The input data | Output data |
‘’ | 7215ee9c7d9dc229d2921a40e899ec5f |
‘a’ | 0cc175b9c0f1b6a831c399e269772661 |
‘b’ | 92eb5ffee6ae2fec3ad71c777531578f |
‘c’ | 4a8a08f09d37b73795649038408b5f33 |
‘d’ | 8277e0910d750195b448797616e091ad |
‘e’ | e1671797c52e15f763380b45e841ec32 |
... | ... |
‘ab’ | 187ef4436122d1cc2f40dc2b92f0eba0 |
... | ... |
In line with the principle that equivalence class is divided, we only need choose three test cases wherein, promptly can test all situations.Be respectively: be input as null character (NUL) (judging whether special character is handled); Input has only a character (situation that input character length is the shortest) and input that a plurality of characters (importing length greater than one situation) are arranged.As shown in table 2 through the test case tabulation of simplifying.
Table 2 is through the test case tabulation of abbreviation
The input data | Output data |
‘’ | 7215ee9c7d9dc229d2921a40e899ec5f |
‘a’ | 0cc175b9c0f1b6a831c399e269772661 |
‘abcdefghigklmn’ | 5fdddbca10d5f9ff15178e1b3e86f2cb |
2.op_Validate:
According to the description of its Z specification, the same enormous amount of original test case of generation.Wherein, for the integrality of test case explanation, herein with the value of pattern yet arranged side by side coming out, but pattern is not the part of test case, and it is the intermediate variable in the program operation process.
The original list of table 3 test case
Input! | Pattern | Output! |
‘‘ | ‘‘ | True |
a | a | True |
Ab | A | True |
Ab | B | True |
Ab | Ab | True |
... | ... | ... |
Store | S | True |
... | ... | ... |
Store | Store | False |
... | ... | ... |
abcStore | A | True |
abcStore | B | True |
... | ... | ... |
AbcStore | Store | False |
... | ... | ... |
Utilize the division principle of equivalence class to carry out can obtaining following a small amount of test case after the abbreviation to it:
Table 4 is through the test case tabulation of abbreviation
Input? | Output! |
‘‘ | True |
A | True |
Store | False |
aStore | False |
Wherein first test case is to the processing of sky input, sees whether code can normally move.Second test case is to having only the disposition of single character; If the 3rd test case is that test input data itself are exactly the threat statement that SQL injects, whether system can check out;
3.op_Authenticate:
This test case is that generation need be by the data of database the inside, and wherein User is the set of leaving two elements of username and password of database the inside in.There has been the User table the inside, tentation data storehouse, wherein has data: userName:mary; EnPassword:123456.Then generate is that original test case is as shown in table 5.
The original list of table 5 test case
Username | enPassword | Success |
‘‘ | ‘‘ | False |
a | a | False |
b | a | False |
... | ... | ... |
Ab | Ab | False |
.. | ... | ... |
Mary | 123456 | True |
... | ... | ... |
Utilize the division principle of equivalence class to carry out can obtaining a small amount of test case as shown in table 6 after the abbreviation to it:
Table 6 is through the test case tabulation of abbreviation
Username | enPassword | Success |
‘‘ | ‘‘ | False |
a | a | False |
ab | ab | False |
Mary | 123 | False |
Tom | 123456 | False |
Mary | 123456 | True |
Wherein, first test case is the processing mode that is used for testing to the sky input, and second test case is to test when input length is 1, and normally whether code operation; The 3rd is that test is imported length greater than 1 o'clock, the ruuning situation of code.If the 4th test case is to test username good and the password mistake, the reaction of system; The 5th test case is test subscriber's name mistake and the correct situation of password; Last test case is that test subscriber's name and password are all correct, and whether code has correct rreturn value.
Simultaneously, we have also carried out horizontal contrast to this method of testing, and main contrast is to liking the mode of coming the threading test case with Isabelle.
Be the quantity of test case that both are generated and the comparison that the test effect is carried out thereof below, as shown in table 7.Contrast relates generally to two aspects: the one, and the quantity of the test case that generates, the 2nd, whether the problem to we occur in code in advance can both find by the test case that generates.
Table 7 is through the test case tabulation of abbreviation
Four. code verification and report generate
At last, be the part of actual detected code.We need be input to test case in the personal code work.At this moment, the name of our usefulness method and document location are realized this process as parameter.Be the result who tests at each method below:
1.op_ClientEncode test result
The code of supposing the user is as follows:
Then by the definition of this method as can be known, for the test case of our input, the output of the return results of this section code and our test case should be the same.So we will Pass to the test of this section code.The report that final generation is passed through smoothly.
2.op_Validate test result
Suppose that its code is as follows:
Thus code as can be known, the incorrect function that realizes its Z specification representation of this code, when testing with following this test case, the information that system returns is true, and correct rreturn value should be false, so test crash.Generate the report shown in figure below and return to the user:
Test?failed!
Test?cases?are:
1.
Input:aSource
Correct?output:False
Current?output:True
3.op_Authenticate test result
Suppose that its code is as follows:
The realization of its code meets the description of Z specification fully, and by test, finds that code can correctly provide output, and the test report that obtains is for passing through smoothly.
Claims (3)
1. the method for generating test case based on the Z specification is characterized in that, comprises the following steps:
One, describes the specification of software systems with the Z language, make the description of formalization method accurate, do not have ambiguous advantage to be not fully exerted;
Two. from the predicate part of the basic module pattern of Z language, generate precondition, guarantee the nonredundancy of the integrality and the precondition of module simultaneously;
Three. according to the precondition that obtains, adopt suitable algorithm, generate available and test case that coverage rate is high;
Four. whether by the detection to code, whether checking user's code meets the expection to program, and identical with the output of the test case that has obtained by the output of comparison object code, provides a corresponding test report.
2. the method for claim 1 is characterized in that, generates available and test case that coverage rate is high comprises the following steps:
At first, the equivalence class of test case is divided; Then, according to the difference of classification, from different fields, choose test case; Carry out gathering of test case at last.
3. method as claimed in claim 2 is characterized in that, generates available and test case that coverage rate is high is specially:
Known op_ClientEncode, it is the title of a method, be illustrated in the ciphering process of client when carrying out the data interaction activity on the net, test whether operate as normal of the method by the character string of input different length, the original test case of its generation is as shown in table 1.
The original list of table 1 test case
(1) equivalence class of test case is divided:
Principle in line with equivalence class is divided is divided into three with the test case equivalence class in the table 1, is respectively: be input as null character (NUL); Input has only a character and input that a plurality of characters are arranged;
(2) from different fields, choose test case:
From three different test case equivalence classes, select a test case respectively: ' '; ' a '; ' abcdefghigklmn ';
(3) carry out gathering of test case;
The test case of choosing in the abovementioned steps (2) can generate available and test case that coverage rate is high, and its result is as shown in table 2:
Table 2 is through the test case tabulation of abbreviation
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201110059216 CN102103539A (en) | 2011-03-11 | 2011-03-11 | Z-specification-based test case generating method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201110059216 CN102103539A (en) | 2011-03-11 | 2011-03-11 | Z-specification-based test case generating method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102103539A true CN102103539A (en) | 2011-06-22 |
Family
ID=44156327
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201110059216 Pending CN102103539A (en) | 2011-03-11 | 2011-03-11 | Z-specification-based test case generating method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102103539A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102508770A (en) * | 2011-10-10 | 2012-06-20 | 南京大学 | Test case suite amplification method based on self-adaption random testing of predicate |
CN105183633A (en) * | 2015-07-21 | 2015-12-23 | 浪潮电子信息产业股份有限公司 | Method and system for generating test case |
CN109614335A (en) * | 2018-12-10 | 2019-04-12 | 艾瑞克·李 | Module ash box behavior specification and grey box testing case designing method |
CN116541854A (en) * | 2023-07-06 | 2023-08-04 | 北京华云安信息技术有限公司 | Vulnerability testing method and device, electronic equipment and storage medium |
CN116756000A (en) * | 2023-05-24 | 2023-09-15 | 浙江望安科技有限公司 | Method for continuously integrating combined form verification |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101620566A (en) * | 2009-07-23 | 2010-01-06 | 北京航空航天大学 | Dynamic random testing method |
CN101833505A (en) * | 2010-04-30 | 2010-09-15 | 天津大学 | Method for detecting security bugs of software system |
-
2011
- 2011-03-11 CN CN 201110059216 patent/CN102103539A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101620566A (en) * | 2009-07-23 | 2010-01-06 | 北京航空航天大学 | Dynamic random testing method |
CN101833505A (en) * | 2010-04-30 | 2010-09-15 | 天津大学 | Method for detecting security bugs of software system |
Non-Patent Citations (1)
Title |
---|
《应用科学学报》 20060731 朱彬等 Z规格说明的测试用例自动生成 第377-381页 1-3 第24卷, 第4期 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102508770A (en) * | 2011-10-10 | 2012-06-20 | 南京大学 | Test case suite amplification method based on self-adaption random testing of predicate |
CN102508770B (en) * | 2011-10-10 | 2015-02-11 | 南京大学 | Test case suite amplification method based on self-adaption random testing of predicate |
CN105183633A (en) * | 2015-07-21 | 2015-12-23 | 浪潮电子信息产业股份有限公司 | Method and system for generating test case |
CN109614335A (en) * | 2018-12-10 | 2019-04-12 | 艾瑞克·李 | Module ash box behavior specification and grey box testing case designing method |
CN109614335B (en) * | 2018-12-10 | 2021-10-15 | 艾瑞克·李 | Module ash box behavior specification description and ash box test case design method |
CN116756000A (en) * | 2023-05-24 | 2023-09-15 | 浙江望安科技有限公司 | Method for continuously integrating combined form verification |
CN116756000B (en) * | 2023-05-24 | 2024-02-06 | 浙江望安科技有限公司 | Method for continuously integrating combined form verification |
CN116541854A (en) * | 2023-07-06 | 2023-08-04 | 北京华云安信息技术有限公司 | Vulnerability testing method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105022691B (en) | A kind of increasingly automated method for testing software based on uml diagram | |
Liu et al. | Covering code behavior on input validation in functional testing | |
CN102567200A (en) | Parallelization security hole detecting method based on function call graph | |
US8904352B2 (en) | Systems and methods for processing source code during debugging operations | |
CN102103539A (en) | Z-specification-based test case generating method | |
CN110543422B (en) | Software package code defect data processing method, system and medium for FPR | |
CN101937396B (en) | Detecting method of unsafe variable use in software program | |
CN105159827A (en) | Reliability accelerated testing method for GUI software | |
Liu et al. | Invcon: A dynamic invariant detector for ethereum smart contracts | |
González et al. | Test data generation for model transformations combining partition and constraint analysis | |
Tavares et al. | Semistructured merge in JavaScript systems | |
Zhou et al. | A method for software vulnerability detection based on improved control flow graph | |
US10853051B2 (en) | Automated candidate repair patch generation | |
ElGamal et al. | Data warehouse testing | |
CN102681932B (en) | Method for detecting processing correctness of software on abnormal input | |
CN106991050A (en) | A kind of static test null pointer dereference defect false positive recognition methods | |
CN110554952B (en) | Search-based hierarchical regression test data generation method | |
Sun et al. | MAF: method-anchored test fragmentation for test code plagiarism detection | |
CN102135940A (en) | Finite automata-based automatic behavior modeling method | |
CN109815131A (en) | The static check system and method for rail transportation vehicle-mounted half formalization demand of software | |
CN101833505A (en) | Method for detecting security bugs of software system | |
Zhang et al. | GoDetector: Detecting concurrent bug in go | |
Zhang et al. | How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation | |
He et al. | A coverage and slicing dependencies analysis for seeking software security defects | |
CN102129406A (en) | Condition value-based software static forecasting method and tool |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110622 |